Academic
Publications
Tamper Resistant Software: An Implementation

Tamper Resistant Software: An Implementation,10.1007/3-540-61996-8_49,David Aucsmith

Tamper Resistant Software: An Implementation   (Citations: 160)
BibTex | RIS | RefWorks Download
This paper describes a technology for the construction of tamper resistant software. It presents a threat model and design principles for countering a defined subset of the threat. The paper then presents an architecture and implementation of tamper resistant software based on the principles described.
Conference: Information Hiding , pp. 317-333, 1996
Cumulative Annual
View Publication
The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.
    • ...Aucsmith [9] proposed early a checksum-based antitamper method, and provided an implementation which, however, imposes a large execution overhead on the 2011 Sixth International Conference on Availability, Reliability and Security...
    • ...The proposed protection scheme has been equipped with the desired properties below. • Distributed protection [9], [5]...

    Hing-Chung Tsanget al. A Robust Anti-tamper Protection Scheme

    • ...As a method without a tamper-proof device, we proposes a method using software obfuscation techniques [13, 14]...

    Kenichi Takahashiet al. Customized program protection for a user customized data protection fr...

    • ...Software with these features is called tamper resistant software, and its realization has been researched [1, 14]...

    Kazuomi Oishiet al. Self destructive tamper response for software protection

    • ...3. Self-decrypting programs [12], [13] that store the encrypted executables and decrypt them before execution 4. Self-checking [12], [14], [15] that embeds, in programs, codes for hash computation as well as correct hash values to be invoked to verify the integrity of the program under execution...
    • ...3. Self-decrypting programs [12], [13] that store the encrypted executables and decrypt them before execution 4. Self-checking [12], [14], [15] that embeds, in programs, codes for hash computation as well as correct hash values to be invoked to verify the integrity of the program under execution...
    • ...Aucsmith [12] proposed storing the encrypted executable and decrypting it before execution...
    • ...Self-checking techniques [12], [14], [15] aim at detecting changes in the program and taking appropriate actions against those changes, as the program is running...

    Alexandros Zahariset al. Live forensics framework for wireless sensor nodes using sandboxing

    • ...Software developers have used a variety of schemes to protect software from unauthorized modification [12,7,1,2]...
    • ...Considering the importance of tamper resistance and obfuscation, a significant amount of work has been done in these areas [13,7,2,1,5]...
    • ...Aucsmith introduced a system called Integrity Verification Kernels (IVK) [2]...

    Sudeep Ghoshet al. A Secure and Robust Approach to Software Tamper Resistance

Sort by: